First published: Wed Jun 17 2020(Updated: )
** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly "no trust boundary crossed."
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libvncserver Project Libvncserver | <0.9.13 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
redhat/libvncserver | <0.9.13 | 0.9.13 |
debian/libvncserver | 0.9.13+dfsg-2+deb11u1 0.9.14+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14399 is a vulnerability discovered in LibVNCServer before 0.9.13.
The severity of CVE-2020-14399 is high with a severity value of 7.5.
CVE-2020-14399 allows access to byte-aligned data through uint32_t pointers in libvncclient/rfbproto.c.
Versions before 0.9.13 of LibVNCServer are affected by CVE-2020-14399.
To fix CVE-2020-14399, upgrade LibVNCServer to version 0.9.13 or higher.